Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
FullAgenticStack WhatsApp-first: RFC-WF-0009
suissAI
suissAI
suissAI
Follow
Feb 26
FullAgenticStack WhatsApp-first: RFC-WF-0009
#
architecture
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
6 min read
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass
BeyondMachines
BeyondMachines
BeyondMachines
Follow
for
BeyondMachines
Feb 11
Critical Gogs Vulnerabilities Enable Remote Code Execution and 2FA Bypass
#
cybersecurity
#
infosec
Comments
Add Comment
1 min read
5 Cybersecurity Habits Every Internet User Should Have
Hamda Naz
Hamda Naz
Hamda Naz
Follow
Feb 25
5 Cybersecurity Habits Every Internet User Should Have
#
beginners
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
2 min read
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
Abhay Negi
Abhay Negi
Abhay Negi
Follow
Feb 11
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
#
community
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
2 min read
Why Windows Crashes and How To Build Stable PCs
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 8
Why Windows Crashes and How To Build Stable PCs
#
techtalks
#
infosec
#
cybersecurity
#
computerscience
Comments
Add Comment
7 min read
How Can Alertable Threads and APC Abuse Lead to System Crash
Abhijit Shirwal
Abhijit Shirwal
Abhijit Shirwal
Follow
Feb 5
How Can Alertable Threads and APC Abuse Lead to System Crash
#
cybersecurity
#
infosec
#
microsoft
#
security
Comments
Add Comment
3 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context
Anton Minin Baranovskii
Anton Minin Baranovskii
Anton Minin Baranovskii
Follow
Feb 27
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context
#
security
#
infosec
#
authentication
#
appsec
3
 reactions
Comments
Add Comment
2 min read
DynoWiper update: Technical analysis and attribution
Mark0
Mark0
Mark0
Follow
Feb 2
DynoWiper update: Technical analysis and attribution
#
cybersecurity
#
infosec
#
malware
#
sandworm
Comments
Add Comment
1 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
Daniel Isaac E
Daniel Isaac E
Daniel Isaac E
Follow
Feb 2
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
LDAP Channel Binding and LDAP Signing
Mark0
Mark0
Mark0
Follow
Jan 30
LDAP Channel Binding and LDAP Signing
#
cybersecurity
#
infosec
#
activedirectory
#
ldap
Comments
Add Comment
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Mark0
Mark0
Mark0
Follow
Jan 30
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
#
cybersecurity
#
infosec
#
javascript
#
vulnerability
Comments
Add Comment
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 12
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
#
techtalks
#
cybersecurity
#
infosec
#
computerscience
1
 reaction
Comments
Add Comment
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
Liudas
Liudas
Liudas
Follow
Jan 28
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
1
 comment
1 min read
The First Full-Scale Cyber War: 4 Years of Lessons
Denis Stetskov
Denis Stetskov
Denis Stetskov
Follow
Jan 25
The First Full-Scale Cyber War: 4 Years of Lessons
#
cybersecurity
#
devops
#
infrastructure
#
infosec
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account